MITRE
About
Corporate Overview
Our History
Mission and Values
Visiting MITRE
Leadership
Executive Team
Board of Trustees
Fellows
Technical Fellows
Visiting Fellows
Awards and Recognition
Corporate Social Responsibility
Building a Foundation for the Future
MITRE Staff Cultivates Los Angeles' Science Ecosystem
Bringing Real World STEM to Students
Building Partnerships and Diversity, One Engineering Conference at a Time
How a Can of Soda Changed a Cafeteria Design
How to Grow Computer Scientists? Start with Kindergartners
MITRE Participates in Outside the Box Day
A Conference Dedicated to Women's Leadership
Nurturing Under-Represented Engineering Students
Young Women and Engineering
Connecting with Our Sponsor Communities
Student Cadets Learn What It Takes to "Play at Work All Day"
A Fishing Experience for Disabled Vets
The Undersea World of Frank Lewis
Promoting a Culture of Health and Wellness
A Clothing Drive That Never Ended
Enriching the Communities Where We Live
Fighting Polio in Africa, Thanks to MITRE's Civic Leave Program
Building a Better World, One Home at a Time
Our Green Buildings
Rolling Up Their Sleeves
Culture of Knowledge Sharing
Locations and Directions
Contact Us
General Inquiries
Centers
We Operate FFRDCs
Special Access for Cities and States
National Security Engineering Center
Who We Are
History and Awards
Where We Focus
Delivering Mission-Critical Capabilities
Solving Global Information Challenges
Integrating Solutions Across Government
Creating Transformational Technologies
Who We Hire
What's New
Center for Advanced Aviation System Development
Who We Are
History
Awards
Where We Focus
Transforming the National Airspace System (NextGen)
Improving National Airspace System Performance
Aviation Safety
Global Aviation
Aviation Research and Development
Transforming Transportation
Participate in Aviation Research
Who We Hire
What's New
Center for Enterprise Modernization
Who We Are
Where We Focus
Tax, Revenue & Financial System Transformation
Fraud, Compliance & Financial Integrity
Economic Infrastructure Modernization & Protection
Veterans Health & Benefits Modernization
Who We Hire
What's New
Homeland Security Systems Engineering and Development Institute
Who We Are
The HSSEDI Difference
Engage With Us
Where We Focus
Prevent Terrorism
Secure and Manage Borders
Enforce and Administer Immigration Laws
Safeguard and Secure Cyberspace
Strengthen National Preparedness and Resilience
Mature and Strengthen Homeland Security
Who We Hire
What's New
CMS Alliance to Modernize Healthcare
Who We Are
Where We Focus
Who We Hire
What's New
National Cybersecurity FFRDC
Who We Are
Where We Focus
Capabilities
Overview
MITRE Labs
Technical Fellows
Horizon Strategy
Center for Strategic Competition
Systems Engineering
MITRE’s Systems Engineering Role
Fellowship FAQs
Overview
SE Resources
Collaborations
System of Systems Engineering Collaborators Information Exchange
Cybersecurity
Overview
Cyber Connections and Directions
Thinking Forward
Thinking Forward: Cyber Defense
Thinking Forward: CyberPhysicalHuman World
Cybersecurity Resources
Awareness & Training
Standards
Tools
What's New
Cyber Threat Intelligence
Situation Awareness
Resiliency
Securing Civil Space
Threat-based Defense
Partnership
Operational Innovation
Acquisition Effectiveness
Overview
Acquisition Management
Cost Analysis
Contracting
Acquisition Initiatives
Affordability Engineering Framework
Continuous Competition
Agile Acquisition
Challenge Based Acquisition
The Science of Acquisition
Enhanced Scenario Based Method
Advanced Technologies
Overview
Information Systems
Cloud Computing
Privacy
Service-Oriented Architecture
Social Software & Collaboration
Signal Processing
Mobile Technologies
Data Science and Analytics
Research
Overview
What's New
Mission-focused Research
Agile Connected Government
Aviation and Transportation
Cyber
Decision Science
Nudge Lab
Nudge Studies in Action
Nudge FAQs
Health
Clinical Analytics for Healthcare
National Security Next
Nanotechnology
Research and Development
Nanosystems Student Programs
Sensing, Processing, and Exploitation
Technology Futures
Technology Transfer
Technology Licensing
FastLicense
Patents
Open Source Software
Partnerships & Collaboration
MITRE Challenge
MITRE Challenge Eligibility Verification
Eligibility Verification FAQs
MITRE Challenge IoT
IoT Leaderboard
IoT FAQs
MITRE Challenge UAS
UAS Challenge Finalists
UAS Challenge Eligibility Overview
UAS Challenge Components
UAS Challenge Details
UAS Challenge Submission Details
UAS FAQs
Surface to Space
Research and Related News
Surface to Space Architecture
Space Policy Podcast
Center for Data-Driven Policy
Careers
Working at MITRE
Valuing Diversity
Collaboration and Innovation
Benefits
Professional Development
Work-Life Balance
Employee Voices
Student Voices
Job Openings
Advanced Search
Student Programs
Military to MITRE
Publications
All Publications
Project Stories
Technical Papers
Systems Engineering Guide
About the SEG
The Evolution of Systems Engineering
The Essence of MITRE’s Systems Engineering
SEG Table of Contents
Enterprise Engineering
Comprehensive Viewpoint
Systems Thinking
Systems Engineering Strategies for Uncertainty and Complexity
Tools to Enable a Comprehensive Viewpoint
Enterprise Planning and Management
IT Governance
Portfolio Management
How to Develop a Measurement Capability
Enterprise Technology, Information, and Infrastructure
IT Infrastructure Engineering
IT Service Management
Information and Data Management
Radio Frequency Spectrum Management
Engineering Information-Intensive Enterprises
Architectures Federation
Design Patterns
Composable Capabilities on Demand (CCOD)
Open Source Software
Privacy Engineering
Privacy Requirements Definition and Testing
Systems of Systems
Engineering Systems in the Context of Systems of Systems
Treating Systems of Systems as Systems
Systems Engineering Life-Cycle Processes as Applied to Systems of Systems
Systems Engineering for Mission Assurance
Cyber Mission Assurance
Crown Jewels Analysis
Cyber Threat Susceptibility Assessment
Cyber Risk Remediation Analysis
Secure Code Review
Supply Chain Risk Management
Transformation Planning and Organizational Change
Performing Organizational Assessments
Formulation of Organizational Transformation Strategies
Stakeholder Assessment and Management
Effective Communication and Influence
Planning for Successful User Adoption
Enterprise Governance
Community of Interest and/or Community of Practice
Standards Boards and Bodies
Policy Analysis
MITRE FFRDC Independent Assessments
Planning and Managing Independent Assessments
SE Life-Cycle Building Blocks
Concept Development
Operational Needs Assessment
Concept of Operations
Operational Requirements
High-Level Conceptual Definition
Requirements Engineering
Eliciting, Collecting, and Developing Requirements
Analyzing and Defining Requirements
Special Considerations for Conditions of Uncertainty: Prototyping and Experimentation
System Architecture
Architectural Frameworks, Models, and Views
Approaches to Architecture Development
Architectural Patterns
System Design and Development
Develop System-Level Technical Requirements
Develop Top-Level System Design
Assess the Design's Ability to Meet the System Requirements
Systems Integration
Identify and Assess Integration and Interoperability (I&I) Challenges
Develop and Evaluate Integration and Interoperability (I&I) Solution Strategies
Assess Integration Testing Approaches
Interface Management
Test and Evaluation
Create and Assess Test and Evaluation Strategies
Assess Test and Evaluation Plans and Procedures
Verification and Validation
Create and Assess Certification and Accreditation Strategies
Implementation, O & M, and Transition
Other SE Life-Cycle Building Blocks Articles
Spanning the Operational Space: How to Select Use Cases and Mission Threads
Acquiring and Incorporating Post-Fielding Operational Feedback into Future Developments
Test and Evaluation of Systems of Systems
Verification and Validation of Simulation Models
Affordability, Efficiency, and Effectiveness
Acquisition Systems Engineering
Acquisition Program Planning
Analyses of Alternatives
Acquisition Management Metrics
Assessing Technical Maturity
Technology Planning
Life-Cycle Cost Estimation
Integrated Master Schedule (IMS)/Integrated Master Plan (IMP) Application
Performance Engineering
Comparison of Investment Analyses
Source Selection Preparation and Evaluation
Picking the Right Contractor
RFP Preparation and Source Selection
Program Acquisition Strategy Formulation
Agile Acquisition Strategy
Evolutionary Acquisition
"Big Bang" Acquisition
Contractor Evaluation
Data Driven Contractor Evaluations and Milestone Reviews
Earned Value Management
Competitive Prototyping
Risk Management
Risk Management Approach and Plan
Risk Identification
Risk Impact Assessment and Prioritization
Risk Mitigation Planning, Implementation, and Progress Monitoring
Risk Management Tools
Configuration Management
How to Control a Moving Baseline
Configuration Management Tools
Integrated Logistics Support
Reliability, Availability, and Maintainability
Managing Energy Efficiency
Quality Assurance and Measurement
Establishing a Quality Assurance Program in the Systems Acquisition or Government Operational Organization
How to Conduct Process and Product Reviews Across Boundaries
Continuous Process Improvement
Implementing and Improving Systems Engineering Processes for the Acquisition Organization
Matching Systems Engineering Process Improvement Frameworks/Solutions with Customer Needs
News
Press Releases
COVID-19 Insights & Impact
CEO Letter
Focal Points
Surface Transportation
Public Interest Impact
Innovation
Defense and Intelligence
Pandemic Response
Promoting Equity
Elections and Transition
Community Impact
Critical Infrastructure
Aerospace and Transportation
AI and Machine Learning
Health Outcomes
In the News
Media Resources
Corporate Events
MITRE Exchange
Search
Information Security Risk Management
Showing 10 results for Information Security Risk Management
Technical Paper |
November 2021
Playbook for Threat Modeling Medical Devices
The “Playbook for Threat Modeling Medical Devices” was developed to increase knowledge of threat modeling throughout the medical device ecosystem in order to further strengthen the cybersecurity and safety of medical devices.
Project Story |
June 2021
D3FEND Knowledge Graph Guides Security Architects to Design Better Cyber Defenses
MITRE is looking for help from the cybersecurity community to build out an NSA-funded framework for network defense. The goal is to help security architects quickly understand the specific capabilities of a wide variety of defensive technologies.
Technical Paper |
April 2021
Achieving Mission Assurance for Enterprises Today and Tomorrow: Zero Trust, The Cloud, and Other Tools
MITRE Technical Fellow Samuel S. Visner explores how combining Zero Trust Architecture with emerging cloud and AI technologies is a better way to protect the modern enterprise against cybersecurity threats.
Technical Paper |
May 2020
Enrollment and Identity Proofing Practices Statement Templates: Supporting Remote Proofing in Accordance with NIST SP 800-63A Identity Assurance Levels 2 & 3
This paper contains a methodology for high assurance identity proofing and customizable templates to develop a documented identity proofing process for Identity Assurance Levels 2 (Unsupervised Remote) and 3 (Supervised Remote In-Person).
Technical Paper |
February 2020
Critical Infrastructure Cyberspace Analysis Tool (CICAT) Capability Description
Critical Infrastructure Cyberspace Analysis Tool (CICAT) is a modeling and simulation capability for evaluating how an adversary might conduct a cyber attack, leveraging MITRE CVE™ and ATT&CK™ open source data.
Technical Paper |
April 2018
Analysis of the NIST Mobile Device Security Practice Guide’s Applicability to Australia
The Australian Cyber Security Growth Network contracted with MITRE to assess the applicability of the NIST Cybersecurity Practice Guide for Mobile Device Security: Cloud and Hybrid Builds to Australian organizations. This report summarizes our analyses.
Technical Paper |
May 2017
Building a National Cyber Information-Sharing Ecosystem
The authors discuss ways to build a national unclassified cyber information-sharing ecosystem based on lessons learned from cyber information-sharing in the U.S. and case studies of three regional Information Sharing and Analysis Organizations.
Technical Paper |
October 2016
Resiliency Mitigations in Virtualized and Cloud Environments
This paper discusses the challenges posed by virtual and cloud environments, and how cyber resiliency techniques can increase mission assurance in environments whose architectures are based on virtual infrastructure and cloud services.
Technical Paper |
May 2016
Structured Cyber Resiliency Analysis Methodology
The Structured Cyber Resiliency Analysis Methodology (SCRAM) defines processes, supported by such resources as frameworks/models, value scales, and datasets. This paper presents a high-level description of SCRAM and identifies representative resources.
Technical Paper |
May 2016
The Risk Management Framework and Cyber Resiliency
When advanced cyber threats are considered, cyber resiliency can be seen as essential to achieving the goals of the Risk Management Framework. This paper presents several perspectives and indicates how cyber resiliency fits from each perspective.
Pages
1
2
3
4
5
6
next ›
»
Browse Topics
Air Traffic Management
(79)
Artificial Intelligence
(64)
Community Impact
(21)
Cybersecurity
(143)
Computer Security
(83)
Economic and Cost Analysis
(16)
Emergency Preparedness and Response
(28)
Intelligence After Next
(11)
Modeling and Simulation
(96)
National Security
(9)
Public Health
(64)
Risk Management
(26)
Publications
All Publications
Project Stories
Technical Papers
Annual Reports
Systems Engineering Guide